The DDoS mitigation example was discussed before.
It appeared there was a reasonable solution.
Please see this post:
http://www.ietf.org/mail-archive/web/sidr/current/msg05605.html 

Sriram

>
>From: [email protected] [mailto:[email protected]] On Behalf Of
>Danny McPherson
>Sent: Wednesday, March 20, 2013 10:59 AM
>To: Stephen Kent
>Cc: [email protected]
>
>On Mar 20, 2013, at 9:44 AM, Stephen Kent <[email protected]> 
>>You cite DDoS mitigation as an example, whereas it seems to be more the 
>>example.
>
>Bah..  How many examples do you need?
>
>>Also, it's not clear
>>that asserting a new origin AS for a target of such an attack is the only way 
>>to
>>deal with the problem, just the way that it is performed today, for ASes that 
>>do
>>not make arrangements in advance to counter such attacks.
>
>Hah, right. If you've any magic the industry would be interested in it Dr.
>Kent.  Until then, please try not to break current capabilities that real 
>operators
>broadly use..
>
>-danny
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to